notation xiii
preface xv
about the author xxiii
chapter 0 reader s guide 1
0.1 outline of this book 2
0.2 a roadmap for readers and instructors 2
0.3 internet and web resources 4
0.4 standards 5
chapter 1 overview 7
1.1 computer security concepts 9
1.2 the osi security architecture 14
1.3 security attacks 15
1.4 security services 19
1.5 security mechanisms 23
1.6 a model for network security 25
1.7 recommended reading and web sites 27
1.8 key terms,review questions,and problems 29
part one symmetric ciphers 31
chapter 2 classical encryption techniques 31
2.1 symmetric cipher model 33